?
Solved

Exchange 2010 - FIPS 140.2 - Configuration query

Posted on 2013-10-28
2
Medium Priority
?
359 Views
Last Modified: 2013-11-12
Hi all, we have an interesting upcoming scenario of which I'd like some advice on how best to proceed!

I've been researching Exchange 2010 and FIPS compliancy and have deduced that OWA won't  work correctly neither will ECP. This raises a problem, as there are 4 remote sites (None of which currently have a server).

Since OWA is broken by enforcing the policy in question (See: http://support.microsoft.com/kb/977961) - Am I correct in thinking Outlook over HTTP/RPC will not function correctly?

Configuring/Installing Exchange 2010 to comply with the FIPS 140.2 encryption is no biggie - But how exactly the clients are to access this is my primary issue.

Next question is whether to host the Exchange server in a datacentre - Or alternatively in one of the 4 offices - And then to create a site to site VPN between all 4 sites - Keeping the traffic 'local' to Outlook et al.

I still have to query a few requirements but initially, this seems like a bit of a b**ch of a job!

Thanks in advance  :o)
0
Comment
Question by:UncleVirus
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 18

Accepted Solution

by:
Netflo earned 1500 total points
ID: 39611240
Looks like it can be done and OWA, ECP and Outlook Anywhere will work too with the following update: http://support.microsoft.com/kb/981119

See the following link for detailed info: http://blogs.technet.com/b/exchange/archive/2010/08/30/3410867.aspx

Best of luck!
0
 
LVL 1

Author Closing Comment

by:UncleVirus
ID: 39640929
Although the solution wasn't really found, this is pretty much all you're left with - Thanks for the help :)
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
how to add IIS SMTP to handle application/Scanner relays into office 365.
Suggested Courses
Course of the Month8 days, 20 hours left to enroll

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question